Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMarch 2016
ARPPM: Administration in the RPPM Model
CODASPY '16: Proceedings of the Sixth ACM Conference on Data and Application Security and PrivacyPages 219–230https://doi.org/10.1145/2857705.2857711The RPPM model of access control uses relationships, paths and principal-matching in order to make access control decisions for general computing systems. Recently Stoller introduced a variant of an early RPPM model supporting administrative actions. ...
- research-articleJune 2014
Path conditions and principal matching: a new approach to access control
SACMAT '14: Proceedings of the 19th ACM symposium on Access control models and technologiesPages 187–198https://doi.org/10.1145/2613087.2613094Traditional authorization policies are user-centric, in the sense that authorization is defined, ultimately, in terms of user identities. We believe that this user-centric approach is inappropriate for many applications, and that what should determine ...
- research-articleNovember 2013
Sleeping android: the danger of dormant permissions
SPSM '13: Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devicesPages 55–66https://doi.org/10.1145/2516760.2516774An Android app must be authorized for permissions, defined by the Android platform, in order to access certain capabilities of an Android device. An app developer specifies which permissions an app will require and these permissions must be authorized ...